TWI559170B - The control method of the rewritable file protection device, and the method of reducing the file protection - Google Patents

The control method of the rewritable file protection device, and the method of reducing the file protection Download PDF

Info

Publication number
TWI559170B
TWI559170B TW104123944A TW104123944A TWI559170B TW I559170 B TWI559170 B TW I559170B TW 104123944 A TW104123944 A TW 104123944A TW 104123944 A TW104123944 A TW 104123944A TW I559170 B TWI559170 B TW I559170B
Authority
TW
Taiwan
Prior art keywords
file
protection
data
content
protection device
Prior art date
Application number
TW104123944A
Other languages
Chinese (zh)
Other versions
TW201541279A (en
Inventor
jian-zhi Lin
Ke-Sen Huang
jian-xing Jiang
Original Assignee
jian-zhi Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by jian-zhi Lin filed Critical jian-zhi Lin
Priority to TW104123944A priority Critical patent/TWI559170B/en
Publication of TW201541279A publication Critical patent/TW201541279A/en
Priority to US15/213,640 priority patent/US10216745B2/en
Application granted granted Critical
Publication of TWI559170B publication Critical patent/TWI559170B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Description

可還原式檔案保護裝置之控制方法以及可還原式檔案保護方法Control method of reductive file protection device and reversible file protection method

本創作提供一種可還原式檔案保護裝置之控制方法以及可還原式檔案保護方法,尤指對一種具有防護資料區以及自定義區的檔案,經過設定保密內容和保密內容保護模式後,根據保密內容保護模式將保密內容搬移至自定義區進行加密,並根據保密內容保護模式對檔案的保密內容進行保護以及還原的方法。 The present invention provides a control method for a reproducible file protection device and a retrievable file protection method, in particular, a file with a protection data area and a custom area, after setting a secret content and a secret content protection mode, according to the confidential content The protection mode moves the confidential content to the custom area for encryption, and protects and restores the confidential content of the file according to the secret content protection mode.

由於環保意識的崛起,人們於檔案傳遞時,漸漸地以電子檔案的方式進行交換,而在電子檔案傳遞時,若電子檔案中具有機密性的檔案,使用者未對電子檔案進行加密,而電子檔案不經意流出時,將造成企業或個人發生不可預期的損失。 Due to the rise of environmental awareness, people gradually exchange electronic files when the files are transmitted. When electronic files are transmitted, if the electronic files have confidential files, the users do not encrypt the electronic files, and the electronic When the file is inadvertently flowed out, it will cause unpredictable losses to the enterprise or individual.

現有技術係以加密的方式,將電子檔案進行加密,當使用者欲閱覽加密的電子檔案時,經由解密的方式,將加密的電子檔案進行解密後,方才能閱讀或使用該電子檔案。 In the prior art, the electronic file is encrypted in an encrypted manner. When the user wants to view the encrypted electronic file, the encrypted electronic file is decrypted by decryption before the electronic file can be read or used.

然而,上述的方式,若檔案提供者僅希望提供使用者閱覽或使用電子檔案之部分內容,而另外之內容不提供該名使用者閱覽或使用時,需先將電子檔案進行編修後,再提供給該名使用者閱覽或使用,若不進行先行編修,該名使用者將可閱覽或使用全部的電子檔案內容,且若檔案提供者欲提供多名使用者閱覽或使用相同電子檔案,而每位使用者能閱覽或使用的電子檔案 的內容有所差異時,需先將電子檔案進行多份複製,且根據每名使用者可觀看的權限調整電子檔案的內容,前述方式將相當費時,不僅僅要維護多份複製的文件且機密性亦存在相當的風險。 However, in the above manner, if the file provider only wants to provide the user to view or use part of the electronic file, and the other content does not provide the user to view or use, the electronic file must be edited and then provided. For the user to view or use, if the user does not make the first edit, the user will be able to view or use the entire electronic file content, and if the file provider wants to provide multiple users to view or use the same electronic file, each Electronic files that users can view or use When the content of the content is different, you need to copy the electronic file multiple times, and adjust the content of the electronic file according to the rights that each user can watch. The above method will be quite time consuming, not only to maintain multiple copies of the file and confidentiality. There are also considerable risks in sex.

另外,現有技術亦有經由遮蔽的方式,將電子檔案中的機密資訊進行刪除,並以使用者無法解讀的符號取代刪除的內容,以達到確實保密的效果。 In addition, in the prior art, confidential information in the electronic file is deleted by means of obscuration, and the deleted content is replaced by a symbol that the user cannot interpret, so as to achieve a secrecy effect.

然而,前述的方式,將致使電子檔案的內容經由遮蔽的過程後,電子檔案便已完全無法復原回原始的電子檔案內容,若檔案提供者欲透過原始的電子檔案進行編輯,以提供給其他使用者使用時,檔案提供者須先將已經被刪除內容的檔案進行重新填寫,接著,根據使用者可觀看的權限,將電子檔案進行遮蔽保密,以提供該名使用者閱覽或使用,如此一來,將使檔案提供者於操作上,相當不便。 However, in the foregoing manner, after the content of the electronic file is blocked, the electronic file can not be restored to the original electronic file content completely. If the file provider wants to edit through the original electronic file, it can be provided to other uses. When using the file, the file provider must first re-fill the file of the deleted content, and then, according to the rights that the user can view, the electronic file is hidden and secreted to provide the user to view or use. Will make the file provider operationally quite inconvenient.

綜上所述,如何改善上述電子檔案的機密性以及現有加密方式的不便性之問題,實乃業界目前有進一步改善之必要。 In summary, how to improve the confidentiality of the above electronic files and the inconvenience of the existing encryption methods is indeed necessary for further improvement in the industry.

為解決上述電子檔案的機密性以及不便性的問題,本創作提供一種可還原式檔案保護裝置之控制方法,用以執行下列步驟:令一可還原式檔案保護裝置顯示一檔案,該檔案具有一防護資料區以及一自定義區,且該防護資料區儲存一未防護資料;令該可還原式檔案保護裝置由一檔案提供者,開啟一檔案保護程式;令該可還原式檔案保護裝置於開啟該檔案保護程式後,由該檔案提供者根據該未防護資料,設定一保密內容; 令該可還原式檔案保護裝置於設定該保密內容後,設定一保密內容保護模式;令該可還原式檔案保護裝置根據該保密內容保護模式,將該保密內容搬移至該自定義區;令該可還原式檔案保護裝置將已搬移該保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料;令該可還原式檔案保護裝置由該檔案提供者輸入一身份認證金鑰對該保密內容進行加密;其中,當該可還原式檔案保護裝接收一控制訊號,以開啟該檔案時,要求一使用者輸入一身份確認資料;令該可還原式檔案保護裝置根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,該可還原式檔案保護裝置將透過該檔案保護程式,自該自定義區搬移該保密內容與該防護資料區之該第一防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,令該可還原式檔案保護裝置顯示該第一防護資料。 In order to solve the problem of confidentiality and inconvenience of the above electronic file, the present invention provides a control method for a recoverable file protection device for performing the following steps: causing a recoverable file protection device to display a file having a file a protection data area and a custom area, and the protection data area stores an unprotected material; the REDUCED file protection device is opened by a file provider to enable a file protection program; After the file protection program, the file provider sets a confidential content according to the unprotected data; And causing the reductive file protection device to set a secret content protection mode after setting the secret content; and causing the reductive file protection device to move the secret content to the customized area according to the secret content protection mode; The storable file protection device stores the unprotected data that has moved the confidential content into the protection data area to replace the unprotected data, and generates a first protection data; and the remedy file protection device is configured by the file The provider enters an identity authentication key to encrypt the secret content; wherein when the recoverable file protection device receives a control signal to open the file, the user is required to input an identity confirmation data; The file protection device compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key, the configurable file protection device will use the file a protection program for moving the confidential content and the first protection material of the protection data area from the custom area to The unprotected data, when the identification data does not match the authentication key, enabling the file type protection device may be reduced to display the first data protection.

為達前述目的,本創作另外提供一種可還原式檔案保護裝置之控制方法,用以執行下列步驟:令一可還原式檔案保護裝置與一伺服器建立一連結,並自該伺服器接收一檔案共用保護規則以及一身份認證金鑰,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式;令該可還原式檔案保護裝置顯示一檔案,該檔案具有一防護資料區以及一自定義區,且該防護資料區儲存一未防護資料;令該可還原式檔案保護裝置由一檔案提供者,開啟一檔案保護程式; 令該可還原式檔案保護裝置於開啟該檔案保護程式後,根據該檔案共用保護規則之該檔案保密內容,對該原始檔案設定該檔案保密內容,且於設定完該檔案保密內容後,根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容搬移至該自定義區;令該可還原式檔案保護裝置將已搬移該檔案保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料;令該可還原式檔案保護裝置根據該身份認證金鑰,對該檔案保密內容進行加密;其中,當該可還原式檔案保護裝置接收一控制訊號,以開啟該檔案時,要求一使用者輸入一身份確認資料;令該可還原式檔案保護裝置根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,該可還原式檔案保護裝置將透過該檔案保護程式,自該自定義區搬移該檔案保密內容與該防護資料區之該第一防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,令該可還原式檔案保護裝置顯示該第一防護資料。 In order to achieve the foregoing objective, the present invention further provides a control method for a recoverable file protection device for performing the following steps: establishing a link between a recoverable file protection device and a server, and receiving a file from the server a shared protection rule and an identity authentication key, the file sharing protection rule having a file security content and a file security content protection mode; causing the redistributable file protection device to display a file having a protection data area and a self Defining a zone, and the protection data zone stores an unprotected material; causing the recoverable file protection device to open a file protection program by a file provider; After the file protection program is opened, the recoverable file protection device sets the file confidential content according to the file sharing protection rule, and after setting the file confidential content, according to the file The file sharing protection mode of the file sharing protection rule moves the confidential content of the file to the custom area; and the reductive file protection device stores the unprotected data that has moved the confidential content of the file to the protection data area In place of the unprotected material, generating a first protection material; causing the reductive file protection device to encrypt the confidential content of the file according to the identity authentication key; wherein, when the recoverable file protection device receives a control signal to open a file, requesting a user to input an identity confirmation data; and causing the recoverable file protection device to compare the identity confirmation data with the identity authentication key according to the identity confirmation data, when When the identity confirmation data matches the identity authentication key, the recoverable file protection device will Passing the file protection program, moving the confidential content of the file and the first protection data of the protection data area from the custom area to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key And causing the reductive file protection device to display the first protection material.

另外,為解決上述電子檔案的機密性以及不便性的問題,本創作提供一種可還原式檔案保護方法,用以執行下列步驟:令一檔案中具有一防護資料區及一自定義區,且該防護資料區儲存一未防護資料;開啟一檔案保護程式;對該未防護資料設定一保密內容;於設定該保密內容後,設定一保密內容保護模式;根據該保密內容保護模式,將該保密內容搬移至該自定義區; 將已搬移該保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料;輸入一身份認證金鑰對該保密內容進行加密;其中,當接收一控制訊號,以開啟該檔案時,要求輸入一身份確認資料;當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式自該自定義區搬移該保密內容與該防護資料區之該第一防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第一防護資料。 In addition, in order to solve the problem of confidentiality and inconvenience of the above electronic file, the present invention provides a recoverable file protection method for performing the following steps: having a file with a protection data area and a custom area, and The protection data area stores an unprotected material; a file protection program is opened; a confidential content is set for the unprotected data; after the confidential content is set, a secret content protection mode is set; and the confidential content is set according to the secret content protection mode Move to the custom area; The unprotected data that has been moved to the confidential content is stored in the protection data area to replace the unprotected data, and a first protection data is generated; and an identity authentication key is input to encrypt the confidential content; wherein, when receiving a control signal is required to input an identity confirmation data when the file is opened; and when the identity confirmation data matches the identity authentication key, the confidential content and the protection data area are moved from the custom zone through the file protection program The first protection data is used to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, the first protection data is displayed.

透過上述所揭露之技術特徵,本創作之可還原式檔案保護裝置之控制方法以及可還原式檔案保護方法,檔案提供者可依據使用者可閱覽或使用的權限不同,於相同的未防護資料中,進而提供不同的防護資料來閱覽或使用,並可在使用者身分與權限確認後,將防護資料還原為未防護資料,以降低檔案提供者於製作電子檔案不便性以及提升機密性的效果。 Through the above-mentioned technical features, the control method of the reproducible file protection device of the present invention and the reversible file protection method, the file provider can be in the same unprotected material according to different rights that the user can view or use. In addition, different protection materials are provided for viewing or use, and the protection data can be restored to unprotected data after the user identity and authority are confirmed, thereby reducing the inconvenience of the file provider in creating the electronic file and improving the confidentiality.

11‧‧‧可還原式檔案保護裝置 11‧‧‧Recoverable file protection device

12‧‧‧伺服器 12‧‧‧Server

13‧‧‧通用串列埠裝置 13‧‧‧Universal tandem device

2‧‧‧檔案提供者 2‧‧‧File Provider

21‧‧‧防護資料區 21‧‧‧protection data area

22‧‧‧自定義區 22‧‧‧Custom Area

3‧‧‧使用者 3‧‧‧Users

4‧‧‧管理者 4‧‧‧Manager

311‧‧‧未防護資料 311‧‧‧Unprotected information

312‧‧‧第一防護資料 312‧‧‧First Protection Information

313‧‧‧第二防護資料 313‧‧‧Second protective information

411‧‧‧檔案共用保護規則 411‧‧ Archive protection rules

圖1A係本創作可還原式檔案保護裝置之控制方法第一實施例架構圖。 FIG. 1A is a structural diagram of a first embodiment of a control method of the presently-recoverable file protection device.

圖1B係本創作可還原式檔案保護裝置之控制方法第一實施例架構圖。 FIG. 1B is a structural diagram of a first embodiment of a control method of the presently-recoverable file protection device.

圖2係本創作第二實施例架構圖。 Figure 2 is a block diagram of the second embodiment of the present creation.

圖3係本創作第一實施例舉例示意圖。 FIG. 3 is a schematic diagram showing an example of the first embodiment of the present creation.

圖4係本創作第二實施例舉例示意圖。 FIG. 4 is a schematic view showing an example of the second embodiment of the present creation.

圖5係本創作第三實施例示意圖。 Figure 5 is a schematic view of a third embodiment of the present creation.

圖6係本創作第四實施例之可還原式檔案保護方法流程圖。 FIG. 6 is a flow chart of a method for protecting a recoverable file according to a fourth embodiment of the present invention.

圖7係本創作第四實施例之可還原式檔案保護方法另一流程圖。 FIG. 7 is another flow chart of the method for protecting the recoverable file according to the fourth embodiment of the present invention.

圖8係本創作第四實施例之可還原式檔案保護方法另一流程圖。 FIG. 8 is another flow chart of the method for protecting a recoverable file according to the fourth embodiment of the present invention.

圖9係本創作第五實施例之可還原式檔案保護方法流程圖。 FIG. 9 is a flowchart of a method for protecting a recoverable file according to a fifth embodiment of the present invention.

圖10係本創作第五實施例之可還原式檔案保護方法另一流程圖。 FIG. 10 is another flow chart of the method for protecting a recoverable file according to the fifth embodiment of the present invention.

圖11係本創作第五實施例之可還原式檔案保護方法另一流程圖。 FIG. 11 is another flow chart of the method for protecting a recoverable file according to the fifth embodiment of the present invention.

以下配合圖示及本創作之較佳實施例,進一步闡述本創作為達創作目的所採取的技術手段。 The technical means adopted by the present creation for the purpose of creation are further explained below in conjunction with the illustrated embodiments and preferred embodiments of the present invention.

請參考圖1A以及圖1B,圖1A以及圖1B係本創作可還原式檔案保護裝置之控制方法第一實施例架構圖,本創作提供一種可還原式檔案保護裝置,該可還原式檔案保護裝置11可為一可攜式電腦或一桌上型主機。本實施例檔案提供者以及使用者亦可藉由同一可還原式檔案保護裝置操作可還原式檔案保護裝置之控制方法。 Please refer to FIG. 1A and FIG. 1B. FIG. 1A and FIG. 1B are structural diagrams of a first embodiment of a method for controlling a reproducible file protection device. The present invention provides a reductive file protection device, the reductive file protection device. 11 can be a portable computer or a desktop host. In this embodiment, the file provider and the user can also operate the control method of the reductive file protection device by using the same reductive file protection device.

詳細而言,由於組織中,每個人的權責不同,因此,當檔案提供者2欲依據使用者3可閱覽或使用的權限,提供檔案給使用者3時,首先,檔案提供者2操作可還原式檔案保護裝置11,可還原式檔案保護裝置11將根據檔案提供者2的操作顯示檔案,而檔案的檔案格式於設計時,為提供使用者具有後續擴充功能的效果,因此,檔案具有防護資料區以及一自定義區,而未防護資料儲存於防護資料區。 In detail, since the rights and responsibilities of each person are different in the organization, when the file provider 2 wants to provide the file to the user 3 according to the authority that the user 3 can view or use, first, the file provider 2 can operate. The reduced file protection device 11, the restoreable file protection device 11 will display the file according to the operation of the file provider 2, and the file format of the file is designed to provide the user with the effect of subsequent expansion functions, therefore, the file has protection The data area and a custom area, and the unprotected data is stored in the protection data area.

接著,檔案提供者2透過可還原式檔案保護裝置11,開啟檔案保護程式,於開啟檔案保護程式後,檔案提供者2根據未防護資料,設定一保密內容,當檔案提供者設定完保密內容後,進一步,設定一保密內容保護模式。接著,可還原式檔案保護裝置11根據保密內容保護模式將保密內容搬移至該自定義區,且將已搬移該保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料,於防護資料產生後,檔案提供者2輸入一身份認證金鑰,以對保密內容進行加密。 Then, the file provider 2 opens the file protection program through the recoverable file protection device 11. After the file protection program is opened, the file provider 2 sets a confidential content according to the unprotected data, and after the file provider sets the confidential content, Further, a privacy content protection mode is set. Then, the reductive file protection device 11 moves the secret content to the custom area according to the secret content protection mode, and stores the unprotected data that has moved the secret content into the protection data area to replace the unprotected data. The first protection data is generated. After the protection data is generated, the file provider 2 inputs an identity authentication key to encrypt the confidential content.

更進一步,檔案提供者2經由網際網路或移動式儲存媒介,將已防護之檔案傳遞給使用者3,由於檔案提供者2係根據使用者3所能閱覽或使用的權限進行防護,因此,當使用者3接獲檔案後,僅能閱覽或使用第一防護資料,若使用者欲進一步閱覽或使用檔案,將送出控制訊號,以開啟該未防護資料,可還原式檔案保護裝置11接收到控制訊號時,將要求使用者3輸入身份確認資料,使用者可透過桌上型電腦輸入身份確認資料,或可透過儲存有身份確認資料之認證裝置與可還原式檔案保護裝置11連接,以將認證裝置內的身份確認資料傳送至可還原式檔案保護裝置11,該認證裝置可為一通用串列埠(Universal Serial Bus:USB)裝置13。 Further, the file provider 2 transmits the protected file to the user 3 via the Internet or a mobile storage medium, and since the file provider 2 protects according to the rights that the user 3 can view or use, After the user 3 receives the file, the first protection data can only be viewed or used. If the user wants to further view or use the file, the control signal will be sent to open the unprotected data, and the restored file protection device 11 receives the file. When the control signal is received, the user 3 is required to input the identity confirmation data, and the user can input the identity confirmation data through the desktop computer, or can connect with the recoverable file protection device 11 through the authentication device storing the identity confirmation data. The identity confirmation data in the authentication device is transmitted to the recoverable file protection device 11, which may be a Universal Serial Bus (USB) device 13.

接著,當使用者3輸入完身份確認資料後,可還原式檔案保護裝置11根據身份確認資料,將身份確認資料與身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符,可還原式檔案保護裝置11將透過該檔案保護程式,自該自定義區搬移該保密內容與防護資料區之第一防護資料,以還原未防護資料,反之,當使用者3所輸入之該身份確認資料與該身份認證金鑰不相符時,可還原式檔案保護裝置11將顯示第一防護資料,提供給未通過身份確認的使用者3閱覽或使用。 Then, after the user 3 inputs the identity confirmation data, the restoreable file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key, The storable file protection device 11 will move the first protection data of the secret content and the protection data area from the custom area through the file protection program to restore the unprotected data, and vice versa, when the user 3 inputs the When the identity confirmation data does not match the identity authentication key, the restoreable file protection device 11 displays the first protection data and provides it to the user 3 who has not passed the identity confirmation for viewing or use.

更者,上述實施例亦可使檔案提供者於可還原式檔案保護裝置11對未防護資料設定保密內容後,進一步,設定保密內容保護模式,可還原式檔案保護裝置11將根據該保密內容保護模式,將保密內容搬移至自定義區,且搬移該保密內容後,以一替代性內容取代未防護資料之保密內容的位置,並將替代性內容取代之未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生該第一防護資料。 Furthermore, the above embodiment may further enable the file provider to set the secret content protection mode after the REDUCABLE file protection device 11 sets the confidential content for the unprotected data, and the restoreable file protection device 11 will protect according to the confidential content. The mode moves the confidential content to the customized area, and after moving the confidential content, replaces the location of the unprotected data with an alternative content, and stores the unprotected data replaced by the substitute content in the protection data area. To replace the unprotected material, the first protective material is generated.

另外,亦可於設定完保密內容保護模式後,可還原式檔案保護裝置11根據保密內容保護模式,先對保密內容進行複製,以產生另一保密內 容,隨後,將複製的保密內容搬移至該自定義區,且搬移該保密內容後,以一替代性內容取代未防護資料之保密內容,並將替代性內容取代之未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生該第一防護資料。 In addition, after the confidential content protection mode is set, the restoreable file protection device 11 first copies the confidential content according to the secret content protection mode to generate another confidentiality. Then, the copied confidential content is moved to the customized area, and after the confidential content is moved, the confidential content of the unprotected data is replaced by an alternative content, and the unprotected data replaced by the substitute content is stored in the protection. The data area is substituted for the unprotected material to generate the first protection data.

請參考圖2,圖2係本創作第二實施例架構圖,首先,檔案提供者2操作之可還原式檔案保護裝置11將自伺服器12接收管理者4設定之一檔案共用保護規則,而該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式,並將該檔案共用保護規則儲存至可還原檔案保護裝置11中。接著,由於組織中,每個人的權責不同,因此,當檔案提供者2欲依據使用者3可閱覽或使用的權限,提供檔案給使用者3時,首先,檔案提供者2操作可還原式檔案保護裝置11,可還原式檔案保護裝置11將根據檔案提供者2的操作顯示檔案,而檔案的檔案格式於設計時,為提供使用者具有後續擴充功能的效果,因此,檔案具有防護資料區以及一自定義區,而防護資料區儲存有一未防護資料。 Please refer to FIG. 2. FIG. 2 is a structural diagram of the second embodiment of the present invention. First, the recoverable file protection device 11 operated by the file provider 2 receives the file sharing protection rule set by the administrator 4 from the server 12. The file sharing protection rule has a file confidentiality content and a file confidential content protection mode, and stores the file sharing protection rule in the recoverable file protection device 11. Then, since the rights and responsibilities of each person are different in the organization, when the file provider 2 wants to provide the file to the user 3 according to the authority that the user 3 can view or use, first, the file provider 2 operates the restoreable type. The file protection device 11, the restoreable file protection device 11 will display the file according to the operation of the file provider 2, and the file format of the file is designed to provide the user with the effect of subsequent expansion functions. Therefore, the file has a protection data area. And a custom area, and the protection data area stores an unprotected material.

接著,檔案提供者2透過可還原式檔案保護裝置11,開啟檔案保護程式,於開啟檔案保護程式後,檔案提供者2根據未防護資料,設定一保密內容,當檔案提供者設定完保密內容後,設定一保密內容保護模式。接著,根據保密內容保護模式,將保密內容搬移至該自定義區,隨後,可還原式檔案保護裝置11將已搬移該保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料,接著,檔案提供者2設定該檔案共用保護規則,可還原式保護裝置11將根據該檔案共用保護規則之該檔案保密內容,對該第一防護資料設定該檔案保密內容,隨後,可還原式檔案保護裝置11根據該檔案保密內容保護模式將檔案保密內容搬移至該自定義區,且將已搬移檔案保密內容之該第一防護資料儲存至防護資料區,以取代該第一防護資料,俾產生一第二防護資料,於第二防護資料產生後,檔案提供者2透過可還原式檔案保護裝置11輸入一身份認證金鑰,以對檔案保密內容以及保密內容進行加密。 Then, the file provider 2 opens the file protection program through the recoverable file protection device 11. After the file protection program is opened, the file provider 2 sets a confidential content according to the unprotected data, and after the file provider sets the confidential content, , set a secret content protection mode. Then, according to the secret content protection mode, the confidential content is moved to the customized area, and then the redistributable file protection device 11 stores the unprotected data that has moved the confidential content to the protection data area to replace the unprotected Data, a first protection data is generated, and then the file provider 2 sets the file sharing protection rule, and the restoreable protection device 11 sets the confidential content of the file according to the file sharing protection rule, and sets the first protection data. The file security content is subsequently saved by the redistributable file protection device 11 according to the file security content protection mode to the customized area, and the first protection data of the saved file security content is stored in the protection data area. In place of the first protection data, a second protection data is generated. After the second protection data is generated, the file provider 2 inputs an identity authentication key through the recoverable file protection device 11 to keep the file confidential and confidential. The content is encrypted.

更者,上述實施例亦可於設定檔案保密內容保護模式,可還原式檔案保護裝置11將根據該檔案保密內容保護模式,將檔案保密內容搬移至自定義區,且搬移該檔案保密內容後,以一替代性內容取代該第一防護資料之檔案保密內容的位置,並將替代性內容取代之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生該第二防護資料。 Moreover, the foregoing embodiment may also be configured to set a file confidential content protection mode, and the restoreable file protection device 11 moves the file confidential content to the customized area according to the file confidential content protection mode, and after moving the file confidential content, Replacing the location of the confidential content of the first protection data with an alternative content, and storing the first protection data replaced by the alternative content in the protection data area to replace the first protection data, and generating the second Protective information.

另外,亦可於設定完檔案保密內容保護模式後,可還原式檔案保護裝置11根據檔案保密內容保護模式,先對該檔案保密內容進行複製,以產生另一檔案保密內容,隨後,將複製的檔案保密內容搬移至該自定義區,且搬移該檔案保密內容後,以一替代性內容取代該第一防護資料之檔案保密內容,並將替代性內容取代之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生該第二防護資料。 In addition, after the file security content protection mode is set, the restoreable file protection device 11 first copies the file security content according to the file security content protection mode to generate another file security content, and then copies the file. After the confidentiality of the file is moved to the customized area, and the confidential content of the file is moved, the confidential content of the first protective material is replaced by an alternative content, and the first protective material replaced by the substitute content is stored in the protection. The data area is substituted for the first protection data to generate the second protection data.

更進一步,檔案提供者2經由網際網路或移動式儲存媒介,將檔案傳遞給使用者3,由於檔案提供者2以及管理者4係根據使用者3所能閱覽或使用的權限對未防護資料設定保密內容以及檔案保密內容,當保密內容以及檔案保密內容設定後,將產生第二防護資料,因此,當使用者3接獲檔案後,僅能閱覽或使用第二防護資料,若使用者3欲進一步閱覽或使用檔案,須送出控制訊號,以開啟該未防護資料,可還原式檔案保護裝置11將要求使用者3輸入身份確認資料。 Further, the file provider 2 transmits the file to the user 3 via the Internet or a mobile storage medium, because the file provider 2 and the manager 4 are based on the rights that the user 3 can view or use. The confidential content and the confidential content of the file are set. When the confidential content and the confidential content of the file are set, the second protection data will be generated. Therefore, when the user 3 receives the file, only the second protection data can be viewed or used, if the user 3 In order to further view or use the file, a control signal is required to open the unprotected material, and the restoreable file protection device 11 will ask the user 3 to input the identity confirmation data.

接著,當使用者3輸入完身份確認資料後,可還原式檔案保護裝置11根據身份確認資料,將身份確認資料與身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符,可還原式檔案保護裝置11將透過該檔案保護程式,自該自定義區搬移保密內容、檔案保密內容與防護資料區之第二防護資料,以還原為未防護資料,反之,當使用者3所輸入之身份確認資料與身份認 證金鑰不相符時,可還原式檔案保護裝置11將顯示第二防護資料,提供給未通過身份確認的使用者3進行閱覽或使用。 Then, after the user 3 inputs the identity confirmation data, the restoreable file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key, The storable file protection device 11 will move the secret content, the file security content and the second protection data of the protection data area from the customized area to the unprotected data through the file protection program, and vice versa, when the user 3 The identity confirmation information and identity entered When the certificate key does not match, the reducible file protection device 11 displays the second protection data and provides it to the user 3 who has not confirmed the identity for viewing or using.

更進一步,上述的第一實施例或第二實施例更可於可還原式檔案保護裝置11於產生該第一防護資料或第二防護資料後,由檔案提供者2設定一檔案管控規則,令該可還原式檔案保護裝置11根據該檔案管控規則,禁止列印檔案、禁止複製檔案、禁止編輯檔案、設定檔案的使用期限、設定檔案的使用次數以及使用時間、於檔案顯示浮水印或於檔案中自動添加文字。 Further, the first embodiment or the second embodiment may further configure a file management control rule by the file provider 2 after the first protection data or the second protection data is generated by the reductive file protection device 11 According to the file management and control rule, the storable file protection device 11 prohibits printing of files, prohibiting copying of files, prohibiting editing of files, setting the period of use of files, setting the number of times of use of files, and using time, displaying watermarks on files or files. Automatically add text.

舉例而言,請參考圖3,圖3係本創作第一實施例舉例示意圖。檔案提供者2操作可還原式檔案保護裝置11,可還原式檔案保護裝置11將根據檔案提供者的操作顯示檔案,而檔案的檔案格式於設計時,為提供使用者具有後續擴充功能的效果,因此,檔案具有防護資料區21以及一自定義區22,而防護資料區21儲存一未防護資料311。 For example, please refer to FIG. 3, which is a schematic diagram of an example of the first embodiment of the present creation. The file provider 2 operates the restoreable file protection device 11, and the restoreable file protection device 11 displays the file according to the operation of the file provider, and the file format of the file is designed to provide the user with the effect of subsequent expansion functions. Therefore, the file has a protection data area 21 and a custom area 22, and the protection data area 21 stores an unprotected material 311.

接著,檔案提供者2透過可還原式檔案保護裝置11,開啟檔案保護程式,於開啟檔案保護程式後,檔案提供者2根據未防護資料311,設定一保密內容(如:「安」「護」),當檔案提供者設定完保密內容(如:「安」「護」)後,進一步,設定一保密內容保護模式(如:隱藏模式)。接著,根據該保密內容保護模式(如:隱藏模式),將保密內容(如:「安」「護」)搬移至該自定義區22,且將已搬移該保密內容(如:「安」「護」)之未防護資料311儲存至該防護資料區21,以取代未防護資料311,俾產生一第一防護資料312,於第一防護資料312產生後,檔案提供者2經由可還原式檔案保護裝置11輸入一身份認證金鑰,以對保密內容(如:「安」「護」)進行加密。 Then, the file provider 2 opens the file protection program through the recoverable file protection device 11. After the file protection program is opened, the file provider 2 sets a confidential content according to the unprotected data 311 (eg, "A", "Guard" After the file provider has set the confidential content (such as "An" and "protect"), further, set a secret content protection mode (such as: hidden mode). Then, according to the secret content protection mode (eg, the hidden mode), the confidential content (eg, "A" and "protection") is moved to the custom area 22, and the confidential content has been moved (eg, "An"" The unprotected data 311 of the protector is stored in the protective data area 21 to replace the unprotected data 311, and a first protective material 312 is generated. After the first protective material 312 is generated, the file provider 2 passes the recoverable file. The protection device 11 inputs an identity authentication key to encrypt the confidential content (eg, "security").

更進一步,檔案提供者2經由網際網路或移動式儲存媒介,將檔案傳遞給使用者3,由於檔案提供者2係根據使用者3所能閱覽或使用的權限,對未防護資料311進行設定保密內容,當保密內容設定後,將產生第一防護資 料,因此,當使用者3接獲檔案後,僅能閱覽或使用第一防護資料312,若使用者3欲進一步閱覽或使用檔案311,須送出控制訊號,以開啟未防護資料311,而可還原式檔案保護裝置11接收到控制訊號後,將要求使用者3輸入身份確認資料。 Further, the file provider 2 transmits the file to the user 3 via the Internet or a mobile storage medium, and the file provider 2 sets the unprotected material 311 according to the rights that the user 3 can view or use. Confidential content, when the confidential content is set, the first protection will be generated Therefore, when the user 3 receives the file, only the first protection data 312 can be viewed or used. If the user 3 wants to further view or use the file 311, the control signal must be sent to open the unprotected material 311. After receiving the control signal, the restored file protection device 11 will ask the user 3 to input the identity confirmation data.

接著,當使用者3輸入完身份確認資料後,可還原式檔案保護裝置11根據身份確認資料,將身份確認資料與身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符,可還原式檔案保護裝置11將透過該檔案保護程式,自該自定義區22搬移保密內容(如:「安」「護」)與防護資料區21之第一防護資料312,以還原為未防護資料311,反之,當使用者3輸入完身份確認資料後,可還原式檔案保護裝置11根據身份確認資料,將身份確認資料與身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰不相符時,可還原式檔案保護裝置11將顯示第一防護資料312。 Then, after the user 3 inputs the identity confirmation data, the restoreable file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key, The storable file protection device 11 will move the confidential content (such as "An" and "protect") from the custom area 22 and the first protection data 312 of the protection data area 21 through the file protection program to restore to the original The protection data 311, on the other hand, when the user 3 inputs the identity confirmation data, the restoreable file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, when the identity confirmation data and the identity When the authentication key does not match, the restoreable file protection device 11 will display the first protection material 312.

再舉一例,請參考圖4,圖4係本創作第二實施例舉例示意圖。可還原式檔案保護裝置11與伺服器12建立連結後,管理者4將經由伺服器12設定檔案共用保護規則411後,並將檔案共用保護規則411傳送至可還原式檔案保護裝置11中進行儲存,而該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式,檔案提供者2操作可還原式檔案保護裝置11,可還原式檔案保護裝置11將根據檔案提供者2的操作顯示檔案,而檔案的檔案格式於設計時,為提供使用者具有後續擴充功能的效果,因此,檔案具有防護資料區21以及一自定義區22,而防護資料區21儲存一未防護資料311。 For another example, please refer to FIG. 4, which is a schematic diagram of an example of the second embodiment of the present creation. After the configurable file protection device 11 establishes a connection with the server 12, the administrator 4 sets the file sharing protection rule 411 via the server 12, and transmits the file sharing protection rule 411 to the storable file protection device 11 for storage. And the file sharing protection rule has a file confidentiality content and a file confidential content protection mode, the file provider 2 operates the restoreable file protection device 11, and the restoreable file protection device 11 displays the file according to the operation of the file provider 2. The file format of the file is designed to provide the user with the effect of subsequent expansion functions. Therefore, the file has a protection data area 21 and a custom area 22, and the protection data area 21 stores an unprotected material 311.

接者,檔案提供者2透過可還原式檔案保護裝置11,開啟檔案保護程式,於開啟檔案保護程式後,檔案提供者2根據未防護資料311,設定一保密內容(如:「資安防護系統」),當檔案提供者設定完保密內容(如:「資安防護系統」)後,進一步,設定一保密內容保護模式(如:遮蔽模式)。接 著,根據該保密內容保護模式(如:遮蔽模式),可還原式檔案保護裝置11將保密內容(如:「資安防護系統」)搬移至該自定義區22,以替代性內容(如:「*」)取代該未防護資料(如:「資安防護系統」),並將已搬移該保密內容(如:「資安防護系統」)之該未防護資料儲存至該防護資料區21,以取代該未防護資料,俾產生一第一防護資料312,進一步,檔案提供者2設定該檔案共用保護規則411,可還原式保護裝置11將根據該檔案共用保護規則411之檔案保密內容(如:「英威康」),對該第一防護資料312設定該檔案保密內容(如:「英威康」)。 The file provider 2 opens the file protection program through the recoverable file protection device 11. After the file protection program is opened, the file provider 2 sets a confidential content according to the unprotected data 311 (for example, "the security protection system" "), when the file provider sets the confidential content (such as "Security Security System"), further, set a secret content protection mode (such as: shadow mode). Connect According to the secret content protection mode (eg, the occlusion mode), the REDUCED file protection device 11 moves the confidential content (eg, "Spirit Security Protection System") to the custom area 22 for alternative content (eg, "*") to replace the unprotected information (such as "Spirit Security System") and to store the unprotected data of the confidential content (such as "Spirit Security System") in the protection data area 21, To replace the unprotected data, a first protection data 312 is generated. Further, the file provider 2 sets the file sharing protection rule 411, and the restoreable protection device 11 will keep the file confidential content according to the file sharing protection rule 411 (eg : "Yingweikang"), the first protection material 312 is set to the confidential content of the file (for example, "Yingweikang").

接著,於設定完檔案保密內容(如:「英威康」),可還原式檔案保護裝置11將根據檔案保密內容保護模式(如:遮蔽模式),將檔案保密內容(如:「英威康」)搬移至該自定義區22,以一替代性內容(如:「*」)取代該第一防護資料312之該檔案保密內容(如:「英威康」),並將替代性內容(如:「*」)取代之該第一防護資料312儲存至該防護資料區21,以取代第一防護資料312,俾產生一第二防護資料313,於第二防護資料313產生後,檔案提供者2輸入一身份認證金鑰,以對檔案保密內容(如:「英威康」)以及保密內容(如:「資安防護系統」)進行加密。 Then, after setting the file confidential content (for example, "Yingkang"), the restoreable file protection device 11 will keep the file confidential according to the file confidential content protection mode (eg, the mask mode) (eg, "Yingkang") Moving to the custom area 22, replacing the confidential content of the first protection material 312 with an alternative content (eg, "*") (eg, "Yingkang"), and replacing the content (eg, " *") The first protection data 312 is replaced by the protection data area 21 to replace the first protection data 312, and a second protection data 313 is generated. After the second protection data 313 is generated, the file provider 2 inputs An identity key to encrypt confidential content (such as "Yingkang") and confidential content (such as "Security Security System").

更進一步,檔案提供者2經由網際網路或移動式儲存媒介,將檔案傳遞給使用者3,當使用者3接獲檔案後,僅能閱覽或使用第二防護資料313,若使用者欲進一步閱覽或使用檔案311,進一步,送出控制訊號,以開啟該未防護資料311,而可還原式檔案保護裝置11接收到控制訊號後,將要求使用者3輸入身份確認資料。 Further, the file provider 2 transmits the file to the user 3 via the Internet or a mobile storage medium. When the user 3 receives the file, only the second protection data 313 can be viewed or used. After viewing or using the file 311, further, the control signal is sent to open the unprotected material 311, and after the control file is received by the restoreable file protection device 11, the user 3 is required to input the identity confirmation data.

接著,當使用者3輸入完身份確認資料後,可還原式檔案保護裝置11根據身份確認資料,將身份確認資料與身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符,可還原式檔案保護裝置11將透過該檔案保護 程式,自該自定義區22搬移檔案保密內容(如:「英威康」)以及保密內容(如:「資安防護系統」)與防護資料區21之第二防護資料313,以還原為未防護資料311,反之,當使用者2輸入完身份確認資料後,可還原式檔案保護裝置11根據身份確認資料,將身份確認資料與身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰不相符時,可還原式檔案保護裝置11將顯示第二防護資料313。 Then, after the user 3 inputs the identity confirmation data, the restoreable file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key, , the restoreable file protection device 11 will protect through the file The program moves the confidential content of the file (such as "Yingweikang") and the confidential content (such as "Spirit Security Protection System") and the second protection data 313 of the protection data area 21 from the custom area 22 to be restored to unprotected The data 311, on the other hand, when the user 2 inputs the identity confirmation data, the restoreable file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, when the identity confirmation data and the identity authentication When the keys do not match, the reducible file protection device 11 will display the second protection material 313.

更進一步,請參考圖5,圖5係本創作第三實施例示意圖。可還原式檔案保護裝置11與伺服器12建立連結後,將自伺服器12接收管理者4設定之檔案共用保護規則411,並將檔案共用保護規則411儲存至可還原式檔案保護裝置11。首先,檔案提供者2操作可還原式檔案保護裝置11,可還原式檔案保護裝置11將根據檔案提供者2的操作顯示檔案,而檔案的檔案格式於設計時,為提供使用者具有後續擴充功能的效果,因此,檔案具有防護資料區以及一自定義區,而防護資料區儲存有一未防護資料311。 Furthermore, please refer to FIG. 5, which is a schematic diagram of a third embodiment of the present creation. After the reductive file protection device 11 establishes a connection with the server 12, the file sharing protection rule 411 set by the manager 4 is received from the server 12, and the file sharing protection rule 411 is stored in the reductive file protection device 11. First, the file provider 2 operates the restoreable file protection device 11, and the restoreable file protection device 11 will display the file according to the operation of the file provider 2, and the file format of the file is designed to provide the user with subsequent expansion functions. The effect is that the file has a protection data area and a custom area, and the protection data area stores an unprotected material 311.

接著,檔案提供者2透過可還原式檔案保護裝置11,開啟檔案保護程式,於開啟檔案保護程式後,檔案提供者2選擇檔案共用保護規則411。接著,於選擇檔案共用保護規則411後,可還原式保護裝置11將根據該檔案共用保護規則411,對未防護資料311中的資料設定一檔案保密內容(如:統一編號的號碼)和一檔案保密內容保護模式。接著,可還原式檔案保護裝置11根據檔案保密內容保護模式(如:隱藏模式),將檔案保密內容(如:統一編號的號碼)搬移至該自定義區,且將已搬移檔案保密內容之未防護資料311儲存至防護資料區,以取代該未防護資料,俾產生一第一防護資料312,於第一防護資料312產生後,檔案提供者2透過可還原式檔案保護裝置11輸入一身份認證金鑰,以對檔案保密內容進行加密。 Then, the file provider 2 opens the file protection program through the recoverable file protection device 11. After the file protection program is opened, the file provider 2 selects the file sharing protection rule 411. Then, after selecting the file sharing protection rule 411, the reductive protection device 11 will set a file confidential content (such as a uniformly numbered number) and a file for the data in the unprotected material 311 according to the file sharing protection rule 411. Confidential content protection mode. Then, the reductive file protection device 11 moves the file confidential content (such as the uniformly numbered number) to the custom area according to the file confidential content protection mode (eg, the hidden mode), and the hidden content of the moved file is not The protection data 311 is stored in the protection data area to replace the unprotected data, and a first protection data 312 is generated. After the first protection data 312 is generated, the file provider 2 inputs an identity authentication through the reductive file protection device 11. The key is used to encrypt the confidential content of the file.

更者,上述實施例亦可於設定檔案保密內容保護模式後,可還原式檔案保護裝置11根據該檔案保密內容保護模式,將檔案保密內容搬移至自定義區,且搬移該檔案保密內容後,以一替代性內容取代該未防護資料之檔案保密內容的位置,並將替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生該第一防護資料。 Furthermore, in the above embodiment, after the file confidential content protection mode is set, the restoreable file protection device 11 moves the file confidential content to the custom area according to the file confidential content protection mode, and after moving the file confidential content, The location of the unprotected material of the unprotected material is replaced by an alternative content, and the unprotected material replaced by the substitute content is stored in the protection data area to replace the unprotected material, and the first protection material is generated.

另外,亦可於設定完檔案保密內容保護模式後,可還原式檔案保護裝置11根據檔案保密內容保護模式,先對該檔案保密內容進行複製,以產生另一檔案保密內容,隨後,將複製的檔案保密內容搬移至該自定義區,且搬移該檔案保密內容後,以一替代性內容取代該未防護資料之檔案保密內容,並將替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生該第一防護資料。 In addition, after the file security content protection mode is set, the restoreable file protection device 11 first copies the file security content according to the file security content protection mode to generate another file security content, and then copies the file. After the confidentiality of the file is moved to the custom area, and the confidential content of the file is moved, the confidential content of the unprotected data is replaced by an alternative content, and the unprotected data replaced by the substitute content is stored in the protection data area. To replace the unprotected material, the first protective material is generated.

更進一步,檔案提供者2經由網際網路或移動式儲存媒介,將檔案傳遞給使用者3,由於檔案提供者2係根據使用者3所能閱覽或使用的權限,對未防護資料311進行防護後,將產生第一防護資料312,因此,當使用者3接獲檔案後,僅能閱覽或使用第一防護資料312,若使用者3欲進一步閱覽或使用檔案,進一步,送出控制訊號,以開啟該未防護資料,而可還原式檔案保護裝置11接收到控制訊號後,將要求使用者3透過可還原式檔案保護裝置11輸入身份確認資料。 Further, the file provider 2 transmits the file to the user 3 via the Internet or a mobile storage medium, and the file provider 2 protects the unprotected material 311 according to the rights that the user 3 can view or use. After that, the first protection data 312 will be generated. Therefore, after the user 3 receives the file, the first protection data 312 can only be viewed or used. If the user 3 wants to further view or use the file, the control signal is further sent. After the unprotected data is turned on, the redistributable file protection device 11 will request the user 3 to input the identity confirmation data through the recoverable file protection device 11 after receiving the control signal.

接著,當使用者3輸入完身份確認資料後,可還原式檔案保護裝置11根據身份確認資料,將身份確認資料與身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符,可還原式檔案保護裝置11將透過該檔案保護程式,自該自定義區搬移檔案保密內容與防護資料區之第一防護資料312,以還原為未防護資料311,反之,當使用者3輸入完身份確認資料,可還原式檔案保護裝置11根據身份確認資料,將身份確認資料與身份認證金鑰進行比對,當 該身份確認資料與該身份認證金鑰不相符時,可還原式檔案保護裝置11將顯示第一防護資料312。 Then, after the user 3 inputs the identity confirmation data, the restoreable file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key, The storable file protection device 11 will use the file protection program to move the first protection material 312 of the file security content and the protection data area from the customized area to be restored to the unprotected material 311, and vice versa, when the user 3 inputs After the identity confirmation data is completed, the restoreable file protection device 11 compares the identity confirmation data with the identity authentication key according to the identity confirmation data, when When the identity confirmation data does not match the identity authentication key, the restoreable file protection device 11 displays the first protection material 312.

上述實施例,該可還原式檔案保護裝置11將該檔案保密內容搬移至該自定義區後,以一替代性內容取代該未防護資料之該檔案保密內容,並將該替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生該第一防護資料。 In the above embodiment, after the removable file protection device 11 moves the file confidential content to the customized area, the file confidential content of the unprotected material is replaced by an alternative content, and the alternative content is replaced by the alternative content. The unprotected data is stored in the protection data area to replace the unprotected data, and the first protection data is generated.

再者,本創作之可還原式檔案保護方法,請參考圖6,圖6係本創作第四實施例之可還原式檔案保護方法流程圖,用以執行下列步驟:令一檔案中具有一防護資料區及一自定義區,且該防護資料區儲存一未防護資料(S611);開啟一檔案保護程式(S612);對該未防護資料設定一保密內容(S613);於設定該保密內容後,設定一保密內容保護模式(S614);根據該保密內容保護模式,將該保密內容搬移至該自定義區(S615);將已搬移該保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料(S616);輸入一身份認證金鑰對該保密內容進行加密(S617);其中,當接收一控制訊號,以開啟該檔案時,要求輸入一身份確認資料(S618);當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式自該自定義區搬移該保密內容與該防護資料區之該第一防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第一防護資料(S619)。 Furthermore, referring to FIG. 6 , FIG. 6 is a flowchart of a method for protecting a recoverable file according to the fourth embodiment of the present invention, which is used to perform the following steps: a data area and a custom area, and the protection data area stores an unprotected data (S611); a file protection program is opened (S612); a confidential content is set for the unprotected data (S613); after the confidential content is set Setting a secret content protection mode (S614); moving the secret content to the custom area according to the secret content protection mode (S615); storing the unprotected data that has moved the confidential content into the protection data area, To replace the unprotected data, generate a first protection data (S616); input an identity authentication key to encrypt the secret content (S617); wherein, when receiving a control signal to open the file, request input An identity confirmation data (S618); when the identity confirmation data matches the identity authentication key, the confidential content and the protection data area are moved from the customization area by the file protection program The first data protection, in order to reconstitute the protective material, and when the identification information does not match with the authentication key, display the first protective material (S619).

另外,請參考圖7,圖7係本創作第四實施例之可還原式檔案保護方法另一流程圖,用以執行下列步驟:令一檔案中具有一防護資料區及一自定義區,且該防護資料區儲存一未防護資料(S711);開啟一檔案保護程式(S712);對該未防護資料設定一保密內容(S713);於設定該保密內容後,設定一保密內容保護模式(S714);根據該保密內容保護模式,將該保密內容搬移至該自定義區(S715);以一替代性內容取代該未防護資料之該保密內容,並將該替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料(S716);輸入一身份認證金鑰對該保密內容進行加密(S717);其中,當接收一控制訊號,以開啟該檔案時,要求輸入一身份確認資料(S718);當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式自該自定義區搬移該保密內容與該防護資料區之該第一防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第一防護資料(S719)。 In addition, please refer to FIG. 7. FIG. 7 is another flowchart of the method for protecting a recoverable file according to the fourth embodiment of the present invention, which is configured to perform the following steps: having a protection data area and a custom area in a file, and The protection data area stores an unprotected data (S711); opens a file protection program (S712); sets a confidential content for the unprotected data (S713); and sets a secret content protection mode after setting the confidential content (S714) And moving the confidential content to the custom area according to the secret content protection mode (S715); replacing the secret content of the unprotected material with an alternative content, and replacing the unprotected material with the substitute content Stored in the protection data area to replace the unprotected data, generate a first protection data (S716); input an identity authentication key to encrypt the confidential content (S717); wherein, when receiving a control signal, When the file is opened, an identity confirmation data is required to be input (S718); when the identity confirmation data matches the identity authentication key, the security is moved from the custom zone through the file protection program. The first volume of the data protection area of data protection, in order to reconstitute the protective material, and when the identification information does not match with the authentication key, display the first protective material (S719).

另外,請參考圖8,圖8係本創作第四實施例之可還原式檔案保護方法另一流程圖,用以執行下列步驟:令一檔案中具有一防護資料區及一自定義區,且該防護資料區儲存一未防護資料(S811);開啟一檔案保護程式(S812);對該未防護資料設定一保密內容,且將該保密內容進行複製(S813); 於設定該保密內容後,設定一保密內容保護模式(S814);根據該保密內容保護模式,將複製之該保密內容搬移至該自定義區(S815),以一替代性內容取代該未防護資料之該保密內容,並將該替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料(S816);輸入一身份認證金鑰對該保密內容進行加密(S817);其中,當接收一控制訊號,以開啟該檔案時,要求輸入一身份確認資料(S818);當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式自該自定義區搬移該保密內容與該防護資料區之該第一防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第一防護資料(S819)。 In addition, please refer to FIG. 8. FIG. 8 is another flowchart of the method for protecting a recoverable file according to the fourth embodiment of the present invention, which is configured to perform the following steps: a file has a protection data area and a custom area, and The protection data area stores an unprotected material (S811); opens a file protection program (S812); sets a confidential content for the unprotected material, and copies the confidential content (S813); After setting the secret content, setting a secret content protection mode (S814); according to the secret content protection mode, moving the copied secret content to the custom area (S815), replacing the unprotected material with an alternative content The confidential content, and the unprotected material replaced by the substitute content is stored in the protection data area to replace the unprotected data, and a first protection data is generated (S816); input an identity authentication key to the The secret content is encrypted (S817); wherein when a control signal is received to open the file, an identity confirmation data is required to be input (S818); when the identity confirmation data matches the identity authentication key, the file is protected The program moves the secret content and the first protection data of the protection data area from the customization area to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, displaying the first protection Information (S819).

另外,請參考圖9,圖9係本創作第五實施例之可還原式檔案保護方法流程圖,用以執行下列步驟:令一檔案中具有一防護資料區及一自定義區,且該防護資料區儲存一未防護資料(S911);開啟一檔案保護程式(S912);對該未防護資料設定一保密內容(S913);於設定該保密內容後,設定一保密內容保護模式(S914);根據該保密內容保護模式,將該保密內容搬移至該自定義區(S915);將已搬移該保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料(S916); 設定一檔案共用保護規則,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式(S917);根據該檔案共用保護規則之該檔案保密內容,對該第一防護資料設定該檔案保密內容(S918);根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容搬移至該自定義區(S919);將已搬移該檔案保密內容之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生一第二防護資料(S920);輸入一身份認證金鑰對該保密內容以及該檔案保密內容進行加密(S921);其中,當接收該控制訊號,以開啟該檔案時,要求輸入該身份確認資料(S922);根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式,自該自定義區搬移該保密內容、該檔案保密內容與該防護資料區之該第二防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第二防護資料(S923)。 In addition, please refer to FIG. 9. FIG. 9 is a flowchart of a method for protecting a recoverable file according to a fifth embodiment of the present invention, for performing the following steps: having a protection data area and a custom area in a file, and the protection The data area stores an unprotected data (S911); a file protection program is opened (S912); a confidential content is set for the unprotected data (S913); after the confidential content is set, a secret content protection mode is set (S914); Transmitting the confidential content to the custom area according to the secret content protection mode (S915); storing the unprotected data that has moved the confidential content into the protection data area to replace the unprotected data, and generating a first a protective material (S916); Setting a file sharing protection rule, the file sharing protection rule has a file confidentiality content and a file confidential content protection mode (S917); according to the file sharing protection rule, the file security content is set, and the file is kept secret for the first protection data Content (S918); according to the file sharing protection mode of the file sharing protection rule, moving the file confidential content to the custom area (S919); storing the first protection data that has moved the file confidential content to the Protecting the data area to replace the first protection data, generating a second protection data (S920); inputting an identity authentication key to encrypt the confidential content and the confidential content of the file (S921); wherein, when receiving the control a signal to open the file, requesting the identity confirmation data (S922); and comparing the identity confirmation data with the identity authentication key according to the identity confirmation data, when the identity confirmation data and the identity authentication key In the case of matching, the confidential content, the confidential content of the file, and the protection are moved from the custom area through the file protection program. The second guard data feed zone to reconstitute the protective material, and when the identification information does not match with the authentication key, to display the second guard data (S923).

請參考圖10,圖10係本創作第五實施例之可還原式檔案保護方法流程圖另一流程圖,用以執行下列步驟:令一檔案中具有一防護資料區及一自定義區,且該防護資料區儲存一未防護資料(S11001);開啟一檔案保護程式(S1002);對該未防護資料設定一保密內容(S1003);於設定該保密內容後,設定一保密內容保護模式(S1004);根據該保密內容保護模式,將該保密內容搬移至該自定義區(S1005); 以一替代性內容取代該未防護資料之該保密內容,並將該替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料(S1006);設定一檔案共用保護規則,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式(S1007);根據該檔案共用保護規則之該檔案保密內容,對該第一防護資料設定該檔案保密內容(S1008);根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容搬移至該自定義區(S1009);以替代性內容取代該第一防護資料之該檔案保密內容,並將該替代性內容取代之第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生一第二防護資料(S1010);輸入一身份認證金鑰對該保密內容以及該檔案保密內容進行加密(S1011);其中,當接收該控制訊號,以開啟該檔案時,要求輸入該身份確認資料(S1012);根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式,自該自定義區搬移該保密內容、該檔案保密內容與該防護資料區之該第二防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第二防護資料(S1013)。 Please refer to FIG. 10. FIG. 10 is another flowchart of a flowchart of a method for protecting a recoverable file according to a fifth embodiment of the present invention, for performing the following steps: having a protection data area and a custom area in a file, and The protection data area stores an unprotected data (S11001); opens a file protection program (S1002); sets a confidential content for the unprotected data (S1003); and sets a confidential content protection mode after setting the confidential content (S1004) The secret content is moved to the custom area according to the secret content protection mode (S1005); Replacing the confidential content of the unprotected material with an alternative content, and storing the unprotected material replaced by the substitute content in the protection data area to replace the unprotected material, and generating a first protection material (S1006) Setting a file sharing protection rule, the file sharing protection rule has a file confidentiality content and a file confidential content protection mode (S1007); according to the file sharing protection rule, the file security content is set for the first protection data File confidentiality content (S1008); according to the file sharing protection mode of the file sharing protection rule, the file confidential content is moved to the custom area (S1009); the file of the first protection data is replaced by an alternative content. Content, and storing the first protection data replaced by the substitute content in the protection data area to replace the first protection data, generating a second protection data (S1010); inputting an identity authentication key to the confidential content And encrypting the confidential content of the file (S1011); wherein when the control signal is received to open the file, input is required Identity confirmation data (S1012); comparing the identity confirmation data with the identity authentication key according to the identity confirmation data, and when the identity confirmation data matches the identity authentication key, the file protection program is used The custom area moves the confidential content, the confidential content of the file and the second protection material of the protection data area to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, the first Second protection data (S1013).

請參考圖11,圖11係本創作第五實施例之可還原式檔案保護方法流程圖另一流程圖,用以執行下列步驟:令一檔案中具有一防護資料區及一自定義區,且該防護資料區儲存一未防護資料(S1101); 開啟一檔案保護程式(S1102);對該未防護資料設定一保密內容(S1103);於設定該保密內容後,設定一保密內容保護模式(S1104);根據該保密內容保護模式,將該保密內容搬移至該自定義區(S1105);以一替代性內容取代該未防護資料之該保密內容,並將該替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料(S1106);設定一檔案共用保護規則,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式(S1107);根據該檔案共用保護規則之該檔案保密內容,對該第一防護資料設定該檔案保密內容(S1108);根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容進行複製,且將複製之該檔案保密內容搬移至該自定義區(S1109);以替代性內容取代該第一防護資料之該檔案保密內容,並將該替代性內容取代之第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生一第二防護資料(S1110);輸入一身份認證金鑰對該保密內容以及該檔案保密內容進行加密(S1111);其中,當接收該控制訊號,以開啟該檔案時,要求輸入該身份確認資料(S1112);根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式,自該自定義區搬移該保密內容、該檔案保密內容與該防護資料區之該第二防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第二防護資料(S1113)。 Please refer to FIG. 11. FIG. 11 is another flow chart of a flowchart of a method for protecting a recoverable file according to a fifth embodiment of the present invention, which is configured to perform the following steps: having a protection data area and a custom area in a file, and The protection data area stores an unprotected material (S1101); Opening a file protection program (S1102); setting a confidential content for the unprotected data (S1103); setting a confidential content protection mode after setting the confidential content (S1104); and according to the secret content protection mode, the confidential content Moving to the custom zone (S1105); replacing the confidential content of the unprotected material with an alternative content, and storing the unprotected material replaced by the substitute content in the protection data zone to replace the unprotected material , generating a first protection data (S1106); setting a file sharing protection rule, the file sharing protection rule having a file security content and a file security content protection mode (S1107); the file security according to the file sharing protection rule Content, setting the confidential content of the file to the first protection data (S1108); copying the confidential content of the file according to the file confidential content protection mode of the file sharing protection rule, and moving the copied confidential content of the file to the Customized area (S1109); replacing the confidential content of the first protection material with an alternative content, and replacing the file The first protection data replaced by the capacity is stored in the protection data area to replace the first protection data, and a second protection data is generated (S1110); inputting an identity authentication key to encrypt the confidential content and the confidential content of the file (S1111); wherein, when the control signal is received to open the file, the identity confirmation data is required to be input (S1112); and the identity confirmation data is compared with the identity authentication key according to the identity confirmation data, when When the identity confirmation data matches the identity authentication key, the secret protection content, the confidential content of the file, and the second protection data of the protection data area are moved from the customization area through the file protection program to restore the unprotected data. The data, and when the identity confirmation data does not match the identity key, the second protection data is displayed (S1113).

透過上述所揭露之技術特徵,本創作之可還原式檔案保護裝置之控制方法以及可還原式檔案保護方法,檔案提供者可依據使用者可閱覽或使用的權限不同,於相同的未防護資料中,提供不同的閱覽或使用的內容,且可於產生防護資料後,亦可以將防護資料還原為未防護資料,俾降低檔案提供者於製作電子檔案不便性以及提升機密性的效果。 Through the above-mentioned technical features, the control method of the reproducible file protection device of the present invention and the reversible file protection method, the file provider can be in the same unprotected material according to different rights that the user can view or use. Provide different content for viewing or use, and after the protection data is generated, the protection data can be restored to unprotected data, which reduces the inconvenience of the file provider in creating electronic files and enhances the confidentiality.

以上所述僅是本創作的較佳實施例而已,並非對本創作做任何形式上的限制,雖然本創作已以較佳實施例揭露如上,然而並非用以限定本創作,任何所屬技術領域中具有通常知識者,在不脫離本創作技術方案的範圍內,當可利用上述揭示的技術內容做出些許更動或修飾為等同變化的等效實施例,但凡是未脫離本創作技術方案的內容,依據本創作的技術實質對以上實施例所做的任何簡單修改、等同變化與修飾,均仍屬於本創作技術方案的範圍內。The above description is only a preferred embodiment of the present invention, and does not impose any form limitation on the present invention. Although the present invention has been disclosed above in the preferred embodiment, it is not intended to limit the present creation, and has any technical field. A person skilled in the art can make some modifications or modifications to equivalent embodiments by using the above-disclosed technical contents without departing from the technical scope of the present invention. The technical essence of the present invention, any simple modifications, equivalent changes and modifications made to the above embodiments are still within the scope of the present technical solution.

11‧‧‧可還原式檔案保護裝置 11‧‧‧Recoverable file protection device

2‧‧‧檔案提供者 2‧‧‧File Provider

21‧‧‧防護資料區 21‧‧‧protection data area

22‧‧‧自定義區 22‧‧‧Custom Area

3‧‧‧使用者 3‧‧‧Users

311‧‧‧未防護資料 311‧‧‧Unprotected information

312‧‧‧防護資料 312‧‧‧Protection data

13‧‧‧通用串列埠裝置 13‧‧‧Universal tandem device

Claims (22)

一種可還原式檔案保護裝置之控制方法,用以執行下列步驟: 令一可還原式檔案保護裝置顯示一檔案,該檔案具有一防護資料區以及一自定義區,且該防護資料區儲存一未防護資料; 令該可還原式檔案保護裝置由一檔案提供者,開啟一檔案保護程式; 令該可還原式檔案保護裝置於開啟該檔案保護程式後,由該檔案提供者根據該未防護資料,設定一保密內容; 令該可還原式檔案保護裝置於設定該保密內容後,設定一保密內容保護模式; 令該可還原式檔案保護裝置根據該保密內容保護模式,將該保密內容搬移至該自定義區; 令該可還原式檔案保護裝置將已搬移該保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料; 令該可還原式檔案保護裝置由該檔案提供者輸入一身份認證金鑰對該保密內容進行加密; 其中,當該可還原式檔案保護裝置接收一控制訊號,以開啟該檔案時,要求一使用者輸入一身份確認資料; 令該可還原式檔案保護裝置根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,該可還原式檔案保護裝置將透過該檔案保護程式,自該自定義區搬移該保密內容與該防護資料區之該第一防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,令該可還原式檔案保護裝置顯示該第一防護資料。A method for controlling a recoverable file protection device for performing the following steps: causing a recoverable file protection device to display a file having a protection data area and a custom area, and the protection data area is stored Protection data; enabling the recoverable file protection device to open a file protection program by a file provider; and causing the redistributable file protection device to open the file protection program, the file provider according to the unprotected data, Setting a confidential content; causing the reductive file protection device to set a secret content protection mode after setting the secret content; and causing the reductive file protection device to move the confidential content to the self according to the secret content protection mode Defining a zone; causing the recoverable file protection device to store the unprotected material that has moved the confidential content into the protection data zone to replace the unprotected material, and generating a first protection profile; The protection device encrypts the secret content by inputting an identity authentication key by the file provider; When the recoverable file protection device receives a control signal to open the file, requesting a user to input an identity confirmation data; and causing the recoverable file protection device to confirm the identity based on the identity confirmation data The identity authentication key is compared. When the identity verification data matches the identity authentication key, the redistributable file protection device moves the confidential content and the protection data from the customized area through the file protection program. The first protection data of the area is used to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, the configurable file protection device displays the first protection data. 如請求項1所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置根據該保密內容保護模式,對該保密內容進行複製,且將複製後的保密內容搬移至該自定義區。The method for controlling a recoverable file protection device according to claim 1, wherein the recoverable file protection device copies the confidential content according to the secret content protection mode, and moves the copied confidential content to This custom area. 如請求項1或2所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置將該保密內容搬移至該自定義區後,以一替代性內容取代該未防護資料之該保密內容,並將該替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生該第一防護資料。The method for controlling a recoverable file protection device according to claim 1 or 2, wherein the removable file protection device moves the confidential content to the custom area, and replaces the unprotected with an alternative content. The confidential content of the data is stored, and the unprotected material replaced by the substitute content is stored in the protection data area to replace the unprotected data, and the first protection material is generated. 如請求項1所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置於產生該第一防護資料後,進一步,執行以下步驟: 令該可還原式檔案保護裝置設定一檔案共用保護規則,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式; 令該可還原式檔案保護裝置根據該檔案共用保護規則之該檔案保密內容,對該第一防護資料設定該檔案保密內容; 令該可還原式檔案保護裝置根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容搬移至該自定義區,且將已搬移該檔案保密內容之該未防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生一第二防護資料; 令該可還原式檔案保護裝置由該使用者輸入該身份認證金鑰,對該保密內容以及該檔案保密內容進行加密; 其中,當該可還原式檔案保護裝置接收該控制訊號,以開啟該檔案時,要求該使用者輸入該身份確認資料; 令該可還原式檔案保護裝置根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,將可還原式檔案保護裝置透過該檔案保護程式,自該自定義區搬移該保密內容、該檔案保密內容與該防護資料區之該第二防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,令該可還原式檔案保護裝置顯示該第二防護資料。The method for controlling a recoverable file protection device according to claim 1, wherein the recoverable file protection device, after generating the first protection data, further performs the following steps: causing the reductive file protection device Setting a file sharing protection rule, the file sharing protection rule has a file confidentiality content and a file confidential content protection mode; and the first file protection device is configured to make the first protection based on the file security content of the file sharing protection rule Setting the confidentiality content of the file; causing the recoverable file protection device to move the confidential content of the file to the customized area according to the file confidential content protection mode of the file sharing protection rule, and the confidential content of the file has been moved The unprotected data is stored in the protection data area to replace the first protection data, and a second protection data is generated; the resettable file protection device is caused by the user to input the identity authentication key, and the confidential content is And encrypting the confidential content of the file; wherein, when the recoverable file is protected Receiving the control signal to open the file, requesting the user to input the identity confirmation data; and causing the recoverable file protection device to compare the identity confirmation data with the identity authentication key according to the identity confirmation data And when the identity verification data is consistent with the identity authentication key, the reductive file protection device moves the confidential content, the confidential content of the file, and the protection data area from the customized area through the file protection program. And the second protection data is used to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, the configurable file protection device displays the second protection data. 如請求項4所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置於設定該檔案保密內容後,對該檔案保密內容進行複製,且將複製後的檔案保密內容搬移至該自定義區。The method for controlling a recoverable file protection device according to claim 4, wherein the resettable file protection device copies the confidential content of the file after setting the confidential content of the file, and keeps the copied file confidential. The content is moved to the custom area. 如請求項3所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置於產生該第一防護資料後,進一步,執行以下步驟: 令該可還原式檔案保護裝置設定一檔案共用保護規則,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式; 令該可還原式檔案保護裝置根據該檔案共用保護規則之該檔案保密內容,對該第一防護資料設定該檔案保密內容; 令該可還原式檔案保護裝置根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容搬移至該自定義區,且將已搬移該檔案保密內容之該未防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生一第二防護資料; 令該可還原式檔案保護裝置由該使用者輸入該身份認證金鑰,對該保密內容以及該檔案保密內容進行加密; 其中,當該可還原式檔案保護裝置接收該控制訊號,以開啟該檔案時,要求該使用者輸入該身份確認資料; 令該可還原式檔案保護裝置根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,將可還原式檔案保護裝置透過該檔案保護程式,自該自定義區搬移該保密內容、該檔案保密內容與該防護資料區之該第二防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,令該可還原式檔案保護裝置顯示該第二防護資料。The method for controlling a recoverable file protection device according to claim 3, wherein after the generating the first protection data, the reductive file protection device further performs the following steps: causing the reductive file protection device Setting a file sharing protection rule, the file sharing protection rule has a file confidentiality content and a file confidential content protection mode; and the first file protection device is configured to make the first protection based on the file security content of the file sharing protection rule Setting the confidentiality content of the file; causing the recoverable file protection device to move the confidential content of the file to the customized area according to the file confidential content protection mode of the file sharing protection rule, and the confidential content of the file has been moved The unprotected data is stored in the protection data area to replace the first protection data, and a second protection data is generated; the resettable file protection device is caused by the user to input the identity authentication key, and the confidential content is And encrypting the confidential content of the file; wherein, when the recoverable file is protected Receiving the control signal to open the file, requesting the user to input the identity confirmation data; and causing the recoverable file protection device to compare the identity confirmation data with the identity authentication key according to the identity confirmation data And when the identity verification data is consistent with the identity authentication key, the reductive file protection device moves the confidential content, the confidential content of the file, and the protection data area from the customized area through the file protection program. And the second protection data is used to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, the configurable file protection device displays the second protection data. 如請求項5所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置將該檔案保密內容搬移至該自定義區後,以一替代性內容取代該第一防護資料之該檔案保密內容,並將該替代性內容取代之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生該第二防護資料。The method for controlling a recoverable file protection device according to claim 5, wherein the removable file protection device causes the file security content to be moved to the custom area, and the first protection is replaced by an alternative content. The confidentiality of the file is stored, and the first protection data replaced by the alternative content is stored in the protection data area to replace the first protection data, and the second protection data is generated. 如請求項6所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置將該檔案保密內容搬移至該自定義區後,以一替代性內容取代該第一防護資料之該檔案保密內容,並將該替代性內容取代之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生該第二防護資料。The method for controlling a recoverable file protection device according to claim 6, wherein the configurable file protection device moves the file security content to the custom area, and replaces the first protection with an alternative content. The confidentiality of the file is stored, and the first protection data replaced by the alternative content is stored in the protection data area to replace the first protection data, and the second protection data is generated. 如請求項1、2、4、5或7所述之可還原式檔案保護裝置之控制方法,其中,當該可還原式檔案保護裝置接收該控制訊號,以開啟該檔案,要求該使用者輸入該身份確認資料時,該使用者將儲存該身份確認資料之一認證裝置與可還原式檔案保護裝置連接,俾將該身份確認資料傳送至該可還原式檔案保護裝置。The method for controlling a recoverable file protection device according to claim 1, 2, 4, 5 or 7, wherein when the rewritable file protection device receives the control signal to open the file, the user is required to input When the identity confirms the data, the user connects the authentication device storing the identity confirmation data with the recoverable file protection device, and transmits the identity confirmation data to the recoverable file protection device. 如請求項6所述之可還原式檔案保護裝置之控制方法,其中,當該可還原式檔案保護裝置接收該控制訊號,以開啟該檔案,要求該使用者輸入該身份確認資料時,該使用者將儲存該身份確認資料之一認證裝置與可還原式檔案保護裝置連接,俾將該身份確認資料傳送至該可還原式檔案保護裝置。The method for controlling a recoverable file protection device according to claim 6, wherein when the rewritable file protection device receives the control signal to open the file and asks the user to input the identity confirmation data, the use One of the authentication devices storing the identity confirmation data is connected to the recoverable file protection device, and the identity confirmation data is transmitted to the recoverable file protection device. 如請求項8所述之可還原式檔案保護裝置之控制方法,其中,當該可還原式檔案保護裝置接收該控制訊號,以開啟該檔案,要求該使用者輸入該身份確認資料時,該使用者將儲存該身份確認資料之一認證裝置與可還原式檔案保護裝置連接,俾將該身份確認資料傳送至該可還原式檔案保護裝置。The method for controlling a recoverable file protection device according to claim 8, wherein when the rewritable file protection device receives the control signal to open the file and asks the user to input the identity confirmation data, the use One of the authentication devices storing the identity confirmation data is connected to the recoverable file protection device, and the identity confirmation data is transmitted to the recoverable file protection device. 一種可還原式檔案保護裝置之控制方法,用以執行下列步驟: 令一可還原式檔案保護裝置與一伺服器建立一連結,並自該伺服器接收ㄧ檔案共用保護規則以及一身份認證金鑰,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式; 令該可還原式檔案保護裝置顯示一檔案,該檔案具有一防護資料區以及一自定義區,且該防護資料區儲存一未防護資料; 令該可還原式檔案保護裝置由一檔案提供者,開啟一檔案保護程式; 令該可還原式檔案保護裝置於開啟該檔案保護程式後,根據該檔案共用保護規則之該檔案保密內容,對該原始檔案設定該檔案保密內容,且於設定完該檔案保密內容後,根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容搬移至該自定義區; 令該可還原式檔案保護裝置將已搬移該檔案保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料; 令該可還原式檔案保護裝置根據該身份認證金鑰,對該檔案保密內容進行加密; 其中,當該可還原式檔案保護裝置接收一控制訊號,以開啟該檔案時,要求一使用者輸入一身份確認資料; 令該可還原式檔案保護裝置根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,該可還原式檔案保護裝置將透過該檔案保護程式,自該自定義區搬移該檔案保密內容與該防護資料區之該第一防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,令該可還原式檔案保護裝置顯示該第一防護資料。A method for controlling a recoverable file protection device for performing the following steps: establishing a link between a recoverable file protection device and a server, and receiving a file sharing protection rule and an identity authentication key from the server The file sharing protection rule has a file confidentiality content and a file confidential content protection mode; the resettable file protection device displays a file having a protection data area and a custom area, and the protection data area is stored An unprotected material; causing the recoverable file protection device to open a file protection program by a file provider; and causing the redistributable file protection device to open the file protection program according to the file sharing protection rule The confidential content, the confidential content of the file is set for the original file, and after the confidential content of the file is set, the confidential content of the file is moved to the custom area according to the file protection content protection mode of the file sharing protection rule; The recoverable file protection device will have moved the confidential content of the file The unprotected data is stored in the protection data area to replace the unprotected data, and a first protection data is generated; and the reproducible file protection device encrypts the confidential content of the file according to the identity authentication key; When the recoverable file protection device receives a control signal to open the file, requesting a user to input an identity confirmation data; and causing the recoverable file protection device to confirm the identity based on the identity confirmation data The identity authentication key is compared. When the identity verification data matches the identity authentication key, the redistributable file protection device moves the file confidential content and the protection data from the customized area through the file protection program. The first protection data of the area is used to restore the unprotected data, and when the identity confirmation data does not match the identity authentication key, the configurable file protection device displays the first protection data. 如請求項12所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置於設定該檔案保密內容後,對該檔案保密內容進行複製,且將複製後的檔案保密內容搬移至該自定義區。The method for controlling a recoverable file protection device according to claim 12, wherein the resettable file protection device copies the confidential content of the file after setting the confidential content of the file, and keeps the copied file confidential. The content is moved to the custom area. 如請求項12或13所述之可還原式檔案保護裝置之控制方法,其中,令該可還原式檔案保護裝置將該檔案保密內容搬移至該自定義區後,以一替代性內容取代該未防護資料之該檔案保密內容,並將該替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生該第一防護資料。The method for controlling a recoverable file protection device according to claim 12 or 13, wherein the removable file protection device causes the file security content to be moved to the custom area, and the replacement is replaced by an alternative content. The confidentiality of the file of the protective material is stored, and the unprotected material replaced by the substitute content is stored in the protective data area to replace the unprotected material, and the first protective material is generated. 一種可還原式檔案保護方法,用以執行下列步驟: 令一檔案中具有一防護資料區及一自定義區,且該防護資料區儲存一未防護資料; 開啟一檔案保護程式; 對該未防護資料設定一保密內容; 於設定該保密內容後,設定一保密內容保護模式; 根據該保密內容保護模式,將該保密內容搬移至該自定義區; 將已搬移該保密內容之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生一第一防護資料; 輸入一身份認證金鑰對該保密內容進行加密; 其中,當接收一控制訊號,以開啟該檔案時,要求輸入一身份確認資料; 當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式自該自定義區搬移該保密內容與該防護資料區之該防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第一防護資料。A reversible file protection method for performing the following steps: having a protection data area and a custom area in a file, and storing an unprotected data in the protection data area; opening a file protection program; Setting a confidential content; setting a confidential content protection mode after setting the confidential content; moving the confidential content to the customized area according to the confidential content protection mode; storing the unprotected data that has moved the confidential content To the protection data area, to replace the unprotected data, to generate a first protection data; input an identity authentication key to encrypt the secret content; wherein, when receiving a control signal to open the file, request input An identity confirmation data; when the identity verification data is consistent with the identity authentication key, the protection content is moved from the customization area and the protection data of the protection data area by the file protection program to restore the unprotected data. And when the identity confirmation data does not match the identity authentication key, the first protection data is displayed. 如請求項15所述之可還原式檔案保護方法,其中,根據該保密內容保護模式後,對該保密內容進行複製,且將複製後的保密內容搬移至該自定義區。The method of claim 15, wherein the secret content is copied according to the secret content protection mode, and the copied secret content is moved to the custom area. 如請求項15或16所述之可還原式檔案保護方法,其中,於搬移該保密內容後,以一替代性內容取代該未防護資料之該保密內容,並將該替代性內容取代之該未防護資料儲存至該防護資料區,以取代該未防護資料,俾產生該第一防護資料。The method of claim 15 or 16, wherein after the moving the content is removed, the confidential content of the unprotected material is replaced with an alternative content, and the alternative content is replaced by the unprotected content. The protection data is stored in the protection data area to replace the unprotected data, and the first protection data is generated. 如請求項15所述之可還原式檔案保護方法,其中,於產生該第一防護資料後,進一步,執行以下步驟: 設定一檔案共用保護規則,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式; 根據該檔案共用保護規則之該檔案保密內容,對該第一防護資料設定該檔案保密內容; 根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容搬移至該自定義區,且將已搬移該檔案保密內容之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生一第二防護資料; 輸入該身份認證金鑰,對該保密內容以及該檔案保密內容進行加密; 其中,當接收該控制訊號,以開啟該檔案時,要求輸入該身份確認資料; 根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式,自該自定義區搬移該保密內容、該檔案保密內容與該防護資料區之該第二防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第二防護資料。The method of claim 15, wherein after the generating the first protection data, further performing the following steps: setting a file sharing protection rule, the file sharing protection rule having a file security content and a The file confidential content protection mode; according to the file sharing protection rule, the file security content is set, the file security content is set for the first protection data; and the file security content is moved according to the file sharing protection mode of the file sharing protection rule Up to the custom zone, and storing the first protection data that has moved the confidential content of the file into the protection data zone to replace the first protection data, and generating a second protection data; input the identity authentication key, Encrypting the secret content and the confidential content of the file; wherein, when the control signal is received to open the file, the identity confirmation data is required to be input; and the identity confirmation data and the identity authentication key are obtained according to the identity confirmation data Compare, when the identity confirmation data matches the identity key Transmitting the confidential content, the confidential content of the file and the second protection material of the protection data area from the customization area through the file protection program to restore the unprotected material, and when the identity confirmation data and the identity authentication The second protection data is displayed when the keys do not match. 如請求項18所述之可還原式檔案保護方法,其中,於設定該檔案保密內容後,對該檔案保密內容進行複製,且將複製後的檔案保密內容搬移至該自定義區。The method of claim 18, wherein after the confidential content of the file is set, the confidential content of the file is copied, and the copied confidential content is moved to the customized area. 如請求項17所述之可還原式檔案保護方法,其中,於產生該第一防護資料後,進一步,執行以下步驟: 設定一檔案共用保護規則,該檔案共用保護規則具有一檔案保密內容以及一檔案保密內容保護模式; 根據該檔案共用保護規則之該檔案保密內容,對該第一防護資料設定該檔案保密內容; 根據該檔案共用保護規則之該檔案保密內容保護模式,將該檔案保密內容搬移至該自定義區,且將已搬移該檔案保密內容之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生一第二防護資料; 輸入該身份認證金鑰,對該保密內容以及該檔案保密內容進行加密; 其中,當接收該控制訊號,以開啟該檔案時,要求輸入該身份確認資料; 根據該身份確認資料,將該身份確認資料與該身份認證金鑰進行比對,當該身份確認資料與該身份認證金鑰相符時,透過該檔案保護程式,自該自定義區搬移該保密內容、該檔案保密內容與該防護資料區之該第二防護資料,以還原該未防護資料,而當該身份確認資料與該身份認證金鑰不相符時,顯示該第二防護資料。The method of claim 17, wherein after the generating the first protection data, further performing the following steps: setting a file sharing protection rule, the file sharing protection rule having a file security content and a The file confidential content protection mode; according to the file sharing protection rule, the file security content is set, the file security content is set for the first protection data; and the file security content is moved according to the file sharing protection mode of the file sharing protection rule Up to the custom zone, and storing the first protection data that has moved the confidential content of the file into the protection data zone to replace the first protection data, and generating a second protection data; input the identity authentication key, Encrypting the secret content and the confidential content of the file; wherein, when the control signal is received to open the file, the identity confirmation data is required to be input; and the identity confirmation data and the identity authentication key are obtained according to the identity confirmation data Compare, when the identity confirmation data matches the identity key Transmitting the confidential content, the confidential content of the file and the second protection material of the protection data area from the customization area through the file protection program to restore the unprotected material, and when the identity confirmation data and the identity authentication The second protection data is displayed when the keys do not match. 如請求項19所述之可還原式檔案保護方法,其中,於搬移該檔案保密內容後,以一替代性內容取代該第一防護資料之該檔案保密內容,並將該替代性內容取代之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生該第二防護資料。The method of claim 19, wherein after the moving content of the file is moved, the confidential content of the first protection data is replaced by an alternative content, and the alternative content is replaced by the alternative content. The first protection data is stored in the protection data area to replace the first protection data, and the second protection data is generated. 如請求項20所述之可還原式檔案保護方法,其中,於搬移該檔案保密內容後,以一替代性內容取代該第一防護資料之該檔案保密內容,並將該替代性內容取代之該第一防護資料儲存至該防護資料區,以取代該第一防護資料,俾產生該第二防護資料。The method of claim 20, wherein after the file security content is moved, the file security content of the first protection data is replaced by an alternative content, and the alternative content is replaced by the alternative content. The first protection data is stored in the protection data area to replace the first protection data, and the second protection data is generated.
TW104123944A 2015-07-23 2015-07-23 The control method of the rewritable file protection device, and the method of reducing the file protection TWI559170B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW104123944A TWI559170B (en) 2015-07-23 2015-07-23 The control method of the rewritable file protection device, and the method of reducing the file protection
US15/213,640 US10216745B2 (en) 2015-07-23 2016-07-19 Control method of recoverable file protection device and protection method of recoverable file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW104123944A TWI559170B (en) 2015-07-23 2015-07-23 The control method of the rewritable file protection device, and the method of reducing the file protection

Publications (2)

Publication Number Publication Date
TW201541279A TW201541279A (en) 2015-11-01
TWI559170B true TWI559170B (en) 2016-11-21

Family

ID=55220495

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104123944A TWI559170B (en) 2015-07-23 2015-07-23 The control method of the rewritable file protection device, and the method of reducing the file protection

Country Status (2)

Country Link
US (1) US10216745B2 (en)
TW (1) TWI559170B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9558365B1 (en) * 2015-12-22 2017-01-31 Kirigami, LLC Systems and methods for creating and sharing protected content

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020003884A1 (en) * 2000-05-26 2002-01-10 Sprunk Eric J. Authentication and/or authorization launch
US20020010679A1 (en) * 2000-07-06 2002-01-24 Felsher David Paul Information record infrastructure, system and method
CN101112035A (en) * 2005-01-28 2008-01-23 株式会社Oak情报系统 File encryption/decryption method, device, program, and computer-readable recording medium containing the program
TWI345705B (en) * 2006-12-20 2011-07-21 Kingston Technology Corp A secure storage system and method of use
TW201325272A (en) * 2011-12-05 2013-06-16 Acer Inc Data transmission system, portable electric device and data transmission method thereof
TWI465091B (en) * 2010-06-03 2014-12-11 Egis Technology Inc System and method of securing data suitable for encrypted file sharing and key recovery

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9311499B2 (en) * 2000-11-13 2016-04-12 Ron M. Redlich Data security system and with territorial, geographic and triggering event protocol
US20030208686A1 (en) * 2002-05-06 2003-11-06 Thummalapally Damodar R. Method of data protection
US9754120B2 (en) * 2015-02-13 2017-09-05 Konica Minolta Laboratory U.S.A., Inc. Document redaction with data retention

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020003884A1 (en) * 2000-05-26 2002-01-10 Sprunk Eric J. Authentication and/or authorization launch
US20020010679A1 (en) * 2000-07-06 2002-01-24 Felsher David Paul Information record infrastructure, system and method
CN101112035A (en) * 2005-01-28 2008-01-23 株式会社Oak情报系统 File encryption/decryption method, device, program, and computer-readable recording medium containing the program
TWI345705B (en) * 2006-12-20 2011-07-21 Kingston Technology Corp A secure storage system and method of use
TWI465091B (en) * 2010-06-03 2014-12-11 Egis Technology Inc System and method of securing data suitable for encrypted file sharing and key recovery
TW201325272A (en) * 2011-12-05 2013-06-16 Acer Inc Data transmission system, portable electric device and data transmission method thereof

Also Published As

Publication number Publication date
US10216745B2 (en) 2019-02-26
US20170024401A1 (en) 2017-01-26
TW201541279A (en) 2015-11-01

Similar Documents

Publication Publication Date Title
JP5947453B2 (en) Passcode management system, passcode device, and super passcode generation method
JP6106805B2 (en) File security method and apparatus therefor
CN102461114A (en) Method for performing double domain encryption a memory device
CN103098071B (en) The method and apparatus that differentiation to digital document accesses is provided
US20120096257A1 (en) Apparatus and Method for Protecting Storage Data of a Computing Apparatus in an Enterprise Network System
CN102461113B (en) Method and system for content replication control
CN102868826B (en) Terminal and terminal data protection method
CN107306254A (en) Digital literary property protection method and system based on double layer encryption
KR20200127643A (en) Method and Apparatus for Distributed Processing of Data for Document Management
JP6343869B2 (en) Portable terminal device and decryption processing program
TWI559170B (en) The control method of the rewritable file protection device, and the method of reducing the file protection
KR101575840B1 (en) Protecting system and method for electronic book with supporting individual copy
CN105160271B (en) Reducible formula file protection device control method and reducible formula document protection method
JP4924477B2 (en) Detachable device, log collection method, program, and recording medium
JP7012927B2 (en) File management methods, systems, terminals and programs
TWI444849B (en) System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof
CN101794260A (en) Automatically imported method of encryption key for mobile storage device
JP2006164096A (en) Encrypted data access control method
GB2540138A (en) Method of exchanging digital content
CN103617400B (en) A kind of file strong box password remapping method
KR102380107B1 (en) Encryption system
US20240056291A1 (en) Data security methods
KR102500764B1 (en) Electronic document sharing server that supports sharing settings for electronic documents based on member identification information and operating method thereof
CN102426635A (en) Display device for file information, display method and system
TWI644204B (en) Method for partitioning memory area of non-volatile memory